|
|
(18.117.92.13)
|
Users online: 12405
|
|
|
|
|
|
Ijournet
|
|
|
|
|
Low Power Design for Cryptographic Applications in Dual Fields Ippalapalli Venu., Raju Srinivasa Department of Electronics and Communication, CVSR College of Engineering, Jodimetla, A.P. Online published on 27 June, 2017. Abstract In the information security within an organization have major changes in computer security and network security. The information security has three aspects i.e. security attack, security mechanism and security service. In the distributed systems, network or communication techniques will provide security. In this security related transformation and some secret information has to be shared by the two parties. Encryption process consist algorithm and key. In encryption process each algorithm produce different outputs based on the keys. Cryptographic algorithms[2] will provide security over distributed systems. In the recent years the implementation of cryptographic algorithms over GF(2m), GF(pm), p_2 and GF(p), p large prime. Cryptographic processor handles the operations for elliptic curve cryptosystems, and the software to generate it. It implements a ROM instruction set for reducing the hardware complexity. Efficient scheduling of the data is used to determine the optimum resource requirement for the processor. Top Keywords Information security, Encryption, Cryptographic algorithms, Finite fields, Elliptic curve Cryptosystems. Top | |
|
|
|
|
║ Site map
║
Privacy Policy ║ Copyright ║ Terms & Conditions ║
|
|
750,555,146 visitor(s) since 30th May, 2005.
|
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
|
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.
|